Advertisement

Journal of Transportation Security

, Volume 9, Issue 1–2, pp 57–70 | Cite as

Cargo theft in the motor carrier industry: an exploratory study

  • Christopher A. BooneEmail author
  • Joseph B. Skipper
  • Adam Murfield
  • Monique L. Ueltschy Murfield
Article

Abstract

Supply chain managers increasingly point to supply chain security as one of their most pressing concerns. One especially challenging security related issue for those responsible for the shipment and transportation of cargo is the threat of cargo theft. Cargo theft is estimated to cost companies $10B annually in the U.S and $30B worldwide, with more than 90 % of those incidents targeting the transportation component of the supply chain. Despite the increased cost and threat of cargo theft, little scholarly research is available which investigates the issue. This research endeavors to extend our understanding of theft of in-transit cargo. More specifically, this effort endeavors to identify how transportation providers are combating cargo theft and thus answers the call for investigations into corporate responses to security issues like cargo theft. This research utilizes in-depth qualitative interviews with industry professionals to gain insights into the practices managers are using to protect against the current threat of cargo theft and to highlight some of the future challenges and trends related to cargo theft.

Keywords

Cargo theft Transportation security Supply chain disruption 

References

  1. Anderson B (2013) Preventing Cargo Theft by Fradulent Carriers. http://blog.ryder.com/2013/04/preventing-cargo-theft-by-fraudulent-carriers/ Accessed 30 Dec 2015
  2. Autry CW, Bobbitt ML (2008) Supply chain security orientation: conceptual development and a proposed framework. Int J Logist Manag 19:42–64Google Scholar
  3. Barth S (1998) Spy vs spy. World Trade 11:34Google Scholar
  4. Bernard HR (2006) Field notes: how to take, code and manage them. Research Methods in Anthropology: Qualitative and Quantitative Approaches, 4th edn. Alta Mira Press, OxfordGoogle Scholar
  5. Boone CA, Craighead CW, Hanna JB, Nair A (2013) Implementation of a system approach for enhanced supply chain continuity and resiliency: a longitudinal study. J Bus Logist 34:222–235CrossRefGoogle Scholar
  6. Chopra S, Sodhi MS (2004) Managing risk to avoid supply-chain breakdown. MIT Sloan Manag Rev 46:53–61Google Scholar
  7. Closs DJ, Mcgarrell EF (2004) Enhancing security throughout the supply chain, IBM center for the business of government, Washington, DCGoogle Scholar
  8. Craighead CW, Blackhurst J, Rungtusanatham MJ, Handfield RB (2007) The severity of supply chain disruptions: design characteristics and mitigation capabilities. Decis Sci 38:131–156CrossRefGoogle Scholar
  9. Creswell JW (2009) Research design: qualitative, quantitative, and mixed methods approaches, SAGE Publications, Inc., Thousand Oaks, CAGoogle Scholar
  10. Ekwall D (2009) The displacement effect in cargo theft. Int J Phys Distrib Logist Manag 39:47–62CrossRefGoogle Scholar
  11. Ekwall D, Lantz B (2015) Modi operandi for cargo theft in EMEA—a seasonality analysis. J Transp Secur 8(3):1–15Google Scholar
  12. FreightWatch (2015) About FreightWatch International. http://www.freightwatchintl.com/about. Accessed 22 Dec 2015
  13. Georgia Legislature (2014) House bill 749. In: Georgia SO (ed) Article 1 of chapter 8 of title 16. GA Georgia General Assembly, AtlantaGoogle Scholar
  14. Glaser BG (1978) Theoretical sensitivity: advances in the methodology of grounded theory, Sociology Press, Mill Valley, CAGoogle Scholar
  15. Glaser BG, Strauss AL (1967) The Discovery of Grounded Theory. Aldine, Chicago, ILGoogle Scholar
  16. Gould J, Macharis C, Haasis H-D (2010) Emergence of security in supply chain management literature. J Transp Secur 3:287–302CrossRefGoogle Scholar
  17. Hendricks KB, Singhal VR (2003) The effect of supply chain glitches on shareholder wealth. J Oper Manag 21:501–522CrossRefGoogle Scholar
  18. Hendricks KB, Singhal VR (2005) Association between supply chain glitches and operating performance. Manag Sci 51:695–711CrossRefGoogle Scholar
  19. Jüttner U, Peck H, Christopher M (2003) Supply chain risk management: outlining an agenda for future research. Int J Logistics Res Appl 6:197–210CrossRefGoogle Scholar
  20. Kilcarr S (2009) Under the radar no more. Fleet Owner 104:36–36Google Scholar
  21. Klodzinski J, Kerr P (2007) Electronic freight theft management system for Florida. Transportation Research Record: Journal of the Transportation Research Board 2008:1–9CrossRefGoogle Scholar
  22. Lincoln YS, Guba EG (1985) Establishing trustworthiness. Naturalistic Inquiry 289:331Google Scholar
  23. McCracken G (1988) The long interview. Sage Publications, Beverly Hills, CAGoogle Scholar
  24. Mello J, Flint DJ (2009) A refined view of grounded theory and its application to logistics research. J Bus Logist 30:107–125CrossRefGoogle Scholar
  25. Palmer JS (2010) The cargo theft threat. Inbound Logistics. Thomas Publising Company, New York, NYGoogle Scholar
  26. Pristrom S, Zaili Y, Jin W, Di Z, Xinping Y (2015) Major issues associated with maritime security and piracy study. Transportation Information and Safety (ICTIS), 2015 International Conference on, 25–28 June 2015. 588–594Google Scholar
  27. Rice Jr., JB, Spayd PW (2005) Investing in supply chain security: Collateral benefits. IBM Center for the Business of Government. http://web.mit.edu/scresponse/repository/Rice_Spayd_IBM_Investing_in_SC_Security_Collateral_Benefits.pdf Accessed 20 May 2015
  28. Sarathy R (2006) Security and the global supply chain. Transportation Journal (American Society of Transportation & Logistics Inc) 45:28–51Google Scholar
  29. Skipper JB, Hanna JB (2009) Minimizing supply chain disruption risk through enhanced flexibility. Int J Phys Distrib Logist Manag 39:404–427CrossRefGoogle Scholar
  30. Spekman RE, Davis EW (2004) Risky business: expanding the discussion on risk and the extended enterprise. Int J Phys Distrib Logist Manag 34:414–433CrossRefGoogle Scholar
  31. Strauss AL, Corbin JM (1990) Basics of qualitative research. Sage, Newbury Park, CAGoogle Scholar
  32. Sutton RI, Staw BM (1995) What theory is not. Adm Sci Q 40:371–384CrossRefGoogle Scholar
  33. Williams Z, Lueg JE, Lemay SA (2008) Supply chain security an overview and research agenda. Int J Logist Manag 19:254–281CrossRefGoogle Scholar
  34. Williams Z, Lueg JE, Taylor RD, Cook RL (2009) Why all the changes? An institutional theory approach to exploring the drivers of supply chain security (SCS). Int J Phys Distrib Logist Manag 39:595–618CrossRefGoogle Scholar
  35. Zailani SH, Subaramaniam KS, Iranmanesh M, Shaharudin MR (2015) The impact of supply chain security practices on security operational performance among logistics service providers in an emerging economy: security culture as moderator. Int J Phys Distrib Logist Manag 45:652–673CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • Christopher A. Boone
    • 1
    Email author
  • Joseph B. Skipper
    • 1
  • Adam Murfield
    • 1
  • Monique L. Ueltschy Murfield
    • 2
  1. 1.Georgia Southern UniversityStatesboroUSA
  2. 2.Miami UniversityOxfordUSA

Personalised recommendations